1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
kenny6666 [7]
3 years ago
14

Given three packets of size 2,500 Bytes (caution this is Bytes not bits) each are ready inside computer 1 to be transmitted onto

link1. Computer 1 has zero processing delay. Assume each router has zero queuing and zero processing delay. Link 1 is a 25 Megabit/sec link (caution that was bits not bytes) and is 10,000 km long. Link 2 is 5Megabits/sec and is 10,000 km long. Link 3 is 15 Megabits/sec and is 10,000 km long. Propagation speed is 2 x 108 m/s. Assume a router has to receive all of a packet before it can start sending it out along the next link (assume store and forward). What is the total end to end delay for packet number one (time from first bit output on link 1 until last bit received at computer 2)
Computers and Technology
1 answer:
gizmo_the_mogwai [7]3 years ago
5 0

Answer: umm sorry

Explanation:

You might be interested in
10. In step 4 of the CSMA/CA protocol, a station that successfully transmits a frame begins the CSMA/CA protocol for a second fr
Neporo4naja [7]

Answer:

It is done to avoid collision among the channel.

Explanation:

CSMA/CD stands for carrier sense multiple access/collision detection.

It is a media access protocol that tells the devices how to respond when a channel is used simultaneously by two devices. The main purpose is to manage the transmission when a collision is encountered.

In the given scenario when the channel is detected idle, the station does not transmits second frame in order to avoid collision. CSMA/CD protocol is designed so that after transmission of first frame, second frame transmission is started at step 2 instead of step 1.

Following is given the flow chart that depicts the working of the protocol CSMA/CD:

<h2> I hope it will help you!</h2><h2 /><h2 />

7 0
3 years ago
Write a program that reads a person's first and last names separated by a space, assuming the first and last names are both sing
Dmitriy789 [7]

<em>Complete Question:</em>

<em>Write a program that reads a person's first and last names, separated by a space. Then the program outputs last name, comma, first name. End with newline.  </em>

<em>Example output if the input is: Maya Jones </em>

<em>Jones, Maya</em>

<em></em>

<em>In C++</em>

<em></em>

Answer:

The program written in C++ is as follows

<em>#include<iostream></em>

<em>using namespace std;</em>

<em>int main(){</em>

<em>string lname, fname;</em>

<em>cout<<"First name: ";</em>

<em>cin>>fname;</em>

<em>cout<<"Last name: ";</em>

<em>cin>>lname;</em>

<em>cout<<lname<<", "<<fname;</em>

<em>return 0;</em>

<em>}</em>

<em />

Explanation:

This line declares lname, fname as string to get the user's last name and first name, respectively

<em>string lname, fname;</em>

This line prompts the user for first name

<em>cout<<"First name: ";</em>

This line gets the user first name

<em>cin>>fname;</em>

This line prompts the user for last name

<em>cout<<"Last name: ";</em>

This line gets the user last name

<em>cin>>lname;</em>

This line prints the desired output

<em>cout<<lname<<", "<<fname;</em>

7 0
3 years ago
Which type of test is run in non-production subnets where you’ve configured a duplicate of the production environment?
LenKa [72]

Answer:

Laboratory Test

Explanation:

  • The lab test runs on a non-product subnet, where it configures duplicates of the production environment. It mirrors the entire system, including the firewall.
  • These test-runs test anything that interferes with the production environment.
  • so correct answer is Laboratory Test

3 0
3 years ago
] 1. Which file type should she use to print the pictures?​
Ksenya-84 [330]

JPG or JPEG

Explanation:

A JPG is versatile in that you can use this file format for print or web, depending on the file's dots per inch (dpi) or pixels per inch (ppi). Images for the web should be 72 dpi, while images for print should be at least 300 dpi. Best used for photographs and web images.

7 0
2 years ago
The vulnerabilities common to the software development process, including buffer overflows, race conditions, input validation at
spayn [35]

Answer:

Aspects of application security includes all except:____.

D. Requirement Assessment.

Explanation:

The requirement assessment is carried out during the initial development stage to meet the user's requirements.  This assessment does not necessarily deal with application security.  However, the other three aspects are security-related.  They focus on the areas where application security is mostly required to reduce errors and technical weaknesses of a software, including authentication, privacy, access control, data segregation, and error handling.

8 0
2 years ago
Other questions:
  • What is the best method for collecting information from a source?
    7·1 answer
  • A type of address translation in which a gateway has a pool of public ip addresses that it is free to assign to a local host whe
    8·1 answer
  • What is mendix about?
    10·1 answer
  • Universal Containers needs the ability to generate contract documents. All the data required for a contract resides in a custom
    6·1 answer
  • How many pieces can be connected on to a to an SPS​
    11·1 answer
  • Python 3.8.2 detais
    15·1 answer
  • Can you help me in this question
    13·1 answer
  • For those that play pc games how do you go outside in The Sims 2?
    7·2 answers
  • In which drawer do you find blocks that allow you to use the A and B buttons on your micro:bit?
    13·2 answers
  • List 2 negative impacts of cybersecurity.<br><br><br><br>Answer and I will give you brainiliest ​
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!